派博傳思國(guó)際中心

標(biāo)題: Titlebook: Biometric Authentication; ECCV 2004 Internatio Davide Maltoni,Anil K. Jain Conference proceedings 2004 Springer-Verlag Berlin Heidelberg 20 [打印本頁(yè)]

作者: 遮陽(yáng)傘    時(shí)間: 2025-3-21 18:51
書目名稱Biometric Authentication影響因子(影響力)




書目名稱Biometric Authentication影響因子(影響力)學(xué)科排名




書目名稱Biometric Authentication網(wǎng)絡(luò)公開度




書目名稱Biometric Authentication網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Biometric Authentication被引頻次




書目名稱Biometric Authentication被引頻次學(xué)科排名




書目名稱Biometric Authentication年度引用




書目名稱Biometric Authentication年度引用學(xué)科排名




書目名稱Biometric Authentication讀者反饋




書目名稱Biometric Authentication讀者反饋學(xué)科排名





作者: 引起    時(shí)間: 2025-3-21 23:46

作者: 狂亂    時(shí)間: 2025-3-22 03:42
Biometric Face Authentication Using Pixel-Based Weak Classifiersscale face image into a Linear Discriminant subspace as input of a classifier such as Support Vector Machines or Multi-layer Perceptrons. Unfortunately, these classifiers involve thousands of parameters that are difficult to store on a smart-card for instance. Recently, boosting algorithms has emerg
作者: coddle    時(shí)間: 2025-3-22 06:26
Null Space Approach of Fisher Discriminant Analysis for Face Recognitionll space-based LDA takes full advantage of the null space while the other methods remove the null space. It proves to be optimal in performance. From the theoretical analysis, we present the NLDA algorithm and the most suitable situation for NLDA. Our method is simpler than all other null space appr
作者: 注意    時(shí)間: 2025-3-22 11:35

作者: 翅膀拍動(dòng)    時(shí)間: 2025-3-22 15:44
Towards a Robust Face Detectorith image-based analysis, in order to better exploit the main characteristics available in the input image. Different modules contribute to the face detection task: 1) a template-based approach initially proposed in [12], 2) an edge-extraction technique well suited to deal with illumination-changes,
作者: Neuralgia    時(shí)間: 2025-3-22 18:26

作者: A簡(jiǎn)潔的    時(shí)間: 2025-3-22 22:04

作者: reject    時(shí)間: 2025-3-23 03:07
Benchmarking of Fingerprint Sensorshodology is available. This paper attempts to address this deficiency by proposing a new methodology to benchmark the fingerprint sensors. The methodology consists of three metrics and the associated procedures to collect the data in order to compute the proposed metrics. Two small scale experiments
作者: 魅力    時(shí)間: 2025-3-23 06:42
Detecting Liveness in Fingerprint Scanners Using Wavelets: Results of the Test Datasetve people, is used as a measure to classify ‘live’ fingers from ‘not live’ fingers. Pre-processing involves filtering of the images using different image processing techniques. Wavelet analysis of the images is performed using Daubechies wavelet. Multiresolution analysis is performed to extract info
作者: GROWL    時(shí)間: 2025-3-23 10:36
Fingerprint Distortion Measurementto scale represented images. Therefore, image data from so-called sweep sensors is reconstructed to obtain conventional images. Measuring the deformation of fingerprint images facilitates other matching approaches not requiring the finger speed information, e.g. using directly concatenated slice ima
作者: Physiatrist    時(shí)間: 2025-3-23 17:52
Study of the Distinctiveness of Level 2 and Level 3 Features in Fragmentary Fingerprint Comparisonts fragment. Level 2 and Level 3 features are considered, and their distinctive potential is estimated in respect to the considered area of a fingerprint fragment. We conclude that the use of level 3 features can offer at least a comparable recognition potential from a small area fingerprint fragmen
作者: TEM    時(shí)間: 2025-3-23 21:14
Biometric Sensor Interoperability: A Case Study in Fingerprints that the data (viz., images) to be compared are obtained using the same sensor and, hence, are restricted in their ability to match or compare biometric data originating from different sensors. Although progress has been made in the development of common data exchange formats to facilitate the exch
作者: 多產(chǎn)子    時(shí)間: 2025-3-23 23:16

作者: SOW    時(shí)間: 2025-3-24 04:43
Capacity and Examples of Template-Protecting Biometric Authentication Systemsd for the discrete and the continuous case. We present, furthermore, a general algorithm that meets the requirements and achieves C. as well as C. (the identification capacity). Finally, we present some practical constructions of the general algorithm and analyze their properties.
作者: 范圍廣    時(shí)間: 2025-3-24 08:13

作者: Ganglion-Cyst    時(shí)間: 2025-3-24 13:37
Approximate Confidence Intervals for Estimation of Matching Error Rates of Biometric Identification veral methods for creating approximate confidence intervals for matching error rates. Testing of biometric identification devices is recognized as inducing intra-individual correlation. In order to estimate error rates associated with these devices, it is necessary to deal with these correlations. I
作者: extract    時(shí)間: 2025-3-24 18:33
Architectures for Biometric Match-on-Token Solutionshe high sensitivity of biometric data (whose manipulation could damage the system security or the users’ privacy), and the feeling of governmental control when central databases are used. The authors have been working in providing solutions to these problems, by promoting the idea of using tokens th
作者: 嫻熟    時(shí)間: 2025-3-24 22:12

作者: 責(zé)任    時(shí)間: 2025-3-25 03:09
Davide Maltoni,Anil K. JainIncludes supplementary material:
作者: Munificent    時(shí)間: 2025-3-25 07:01
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/b/image/188163.jpg
作者: RLS898    時(shí)間: 2025-3-25 07:51

作者: 6Applepolish    時(shí)間: 2025-3-25 13:58
0302-9743 Overview: Includes supplementary material: 978-3-540-22499-0978-3-540-25976-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 禍害隱伏    時(shí)間: 2025-3-25 17:24
Ethik der langfristigen Planung,d for the discrete and the continuous case. We present, furthermore, a general algorithm that meets the requirements and achieves C. as well as C. (the identification capacity). Finally, we present some practical constructions of the general algorithm and analyze their properties.
作者: cancellous-bone    時(shí)間: 2025-3-25 22:40
Effekte technologischer Angebotsschocksing salient feature regions corresponding to eyes, eye brows, nose and lips. However, ICA basis images do not display perfectly local characteristic in the sense that pixels that do not belong to locally salient feature regions still have some weight values. These pixels in the non-salient regions c
作者: 自戀    時(shí)間: 2025-3-26 03:19

作者: Mitigate    時(shí)間: 2025-3-26 05:36
Konzept des Obliged Consumptionscale face image into a Linear Discriminant subspace as input of a classifier such as Support Vector Machines or Multi-layer Perceptrons. Unfortunately, these classifiers involve thousands of parameters that are difficult to store on a smart-card for instance. Recently, boosting algorithms has emerg
作者: myopia    時(shí)間: 2025-3-26 09:02
Konzept des Obliged Consumptionll space-based LDA takes full advantage of the null space while the other methods remove the null space. It proves to be optimal in performance. From the theoretical analysis, we present the NLDA algorithm and the most suitable situation for NLDA. Our method is simpler than all other null space appr
作者: hereditary    時(shí)間: 2025-3-26 14:30

作者: Innovative    時(shí)間: 2025-3-26 17:05

作者: Irksome    時(shí)間: 2025-3-27 00:32
https://doi.org/10.1007/978-3-663-02659-4ssumed for a false acceptance and false rejection. This rate between costs can be intuitively known by the system responsible and are a starting point to fulfil user security requirements. With this user-friendly data, an algorithm based on screening techniques to compute the acceptance threshold is
作者: Anonymous    時(shí)間: 2025-3-27 01:24

作者: 反叛者    時(shí)間: 2025-3-27 07:16
https://doi.org/10.1007/978-3-663-20493-0hodology is available. This paper attempts to address this deficiency by proposing a new methodology to benchmark the fingerprint sensors. The methodology consists of three metrics and the associated procedures to collect the data in order to compute the proposed metrics. Two small scale experiments
作者: 激怒某人    時(shí)間: 2025-3-27 10:15

作者: DEAWL    時(shí)間: 2025-3-27 13:54
https://doi.org/10.1007/978-3-663-04894-7to scale represented images. Therefore, image data from so-called sweep sensors is reconstructed to obtain conventional images. Measuring the deformation of fingerprint images facilitates other matching approaches not requiring the finger speed information, e.g. using directly concatenated slice ima
作者: 發(fā)酵    時(shí)間: 2025-3-27 21:36
https://doi.org/10.1007/978-3-663-04894-7ts fragment. Level 2 and Level 3 features are considered, and their distinctive potential is estimated in respect to the considered area of a fingerprint fragment. We conclude that the use of level 3 features can offer at least a comparable recognition potential from a small area fingerprint fragmen
作者: 幻影    時(shí)間: 2025-3-27 22:11
Ethics of Science and Technology Assessment that the data (viz., images) to be compared are obtained using the same sensor and, hence, are restricted in their ability to match or compare biometric data originating from different sensors. Although progress has been made in the development of common data exchange formats to facilitate the exch
作者: 匯總    時(shí)間: 2025-3-28 03:45
https://doi.org/10.1007/978-3-642-42004-7bile embedded devices in which floating-point processing units (FPU) are absent. Earlier Hong and Jain reported a fingerprint enhancement algorithm based on the Gabor Filter. This algorithm and its derivatives have been proved to be quite effective in improving the fingerprint verification reliabili
作者: THE    時(shí)間: 2025-3-28 09:56

作者: 摻假    時(shí)間: 2025-3-28 13:16

作者: NAVEN    時(shí)間: 2025-3-28 15:43

作者: 潛伏期    時(shí)間: 2025-3-28 22:28
https://doi.org/10.1057/9780230608764he high sensitivity of biometric data (whose manipulation could damage the system security or the users’ privacy), and the feeling of governmental control when central databases are used. The authors have been working in providing solutions to these problems, by promoting the idea of using tokens th
作者: LATER    時(shí)間: 2025-3-28 23:47
https://doi.org/10.1057/9780230608764to hide challenge responses in a WSQ-compressed fingerprint image. In this paper, we extend the work to analyze the security holes in the data hiding method and enhance the hiding technique to thwart attacks on the system. We employ several proven IT security techniques to provide a secure method of
作者: PAGAN    時(shí)間: 2025-3-29 06:20
https://doi.org/10.1007/b99174access control; architecture; bioinformatics; biometric authentication; biometric systems; biometrics; fin
作者: 緯度    時(shí)間: 2025-3-29 11:16

作者: 緯線    時(shí)間: 2025-3-29 12:32

作者: GENRE    時(shí)間: 2025-3-29 18:54
Pose Invariant Face Recognition Under Arbitrary Unknown Lighting Using Spherical Harmonicsm robust pose and illumination invariant face recognition by using the recovered 3D faces. During training, given an image under arbitrary illumination, we first compute the shape parameters from a shape error estimated by the displacements of a set of feature points. Then we estimate the illuminati
作者: Culpable    時(shí)間: 2025-3-29 20:31

作者: 雪上輕舟飛過(guò)    時(shí)間: 2025-3-30 00:34

作者: coddle    時(shí)間: 2025-3-30 05:42

作者: magenta    時(shí)間: 2025-3-30 12:12
https://doi.org/10.1007/978-3-658-09766-0m robust pose and illumination invariant face recognition by using the recovered 3D faces. During training, given an image under arbitrary illumination, we first compute the shape parameters from a shape error estimated by the displacements of a set of feature points. Then we estimate the illuminati
作者: Arable    時(shí)間: 2025-3-30 15:20
Konzept des Obliged Consumptionnly requires one eigen-value analysis and is also applicable to the large sample size problem. Experiments are carried out on different face data sets to demonstrate the effectiveness of the proposed methods.
作者: amyloid    時(shí)間: 2025-3-30 16:41

作者: 燈泡    時(shí)間: 2025-3-30 23:33

作者: 噴油井    時(shí)間: 2025-3-31 01:46
https://doi.org/10.1007/978-3-663-02659-4correspondences of minutiae that may be caused by various noise and distortion factors. Relatively compact and theoretically grounded model of the deformations is proposed, which allows to obtain the estimations of discrepancies in the most extreme cases.
作者: 易改變    時(shí)間: 2025-3-31 08:17

作者: 帶傷害    時(shí)間: 2025-3-31 12:05
https://doi.org/10.1007/978-3-663-02659-4two classifiers (neural network radial basis function and support vector machine). Experimental results with a 100 people face database are shown. This method can be also applied into other biometric applications in which this threshold should be calculated.
作者: minimal    時(shí)間: 2025-3-31 15:07
https://doi.org/10.1007/978-3-663-20493-0ensors with different skin type and under different weather condition. The effect of number of usage with acquisition performance is also analyzed. Analysis of the results shows that the proposed method does provide a basic sensor benchmarking capability.
作者: lymphedema    時(shí)間: 2025-3-31 20:33
https://doi.org/10.1057/9780230608764minal. To achieve this, a general architecture, based on a set of requirements previously defined, will be outlined. At the end, directives for the implementation of such an architecture using smartcards and USB-Tokens will be given.
作者: aspersion    時(shí)間: 2025-3-31 23:48
Towards a Robust Face Detectorerns that further improves the face/non-face discrimination. The experimental results show that the system can localize faces in images with complex background, even in presence of strong illumination changes.
作者: calumniate    時(shí)間: 2025-4-1 04:59
Automatic Detection of the Optimal Acceptance Threshold in a Face Verification Systemtwo classifiers (neural network radial basis function and support vector machine). Experimental results with a 100 people face database are shown. This method can be also applied into other biometric applications in which this threshold should be calculated.




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
徐汇区| 五大连池市| 台南市| 福州市| 涿州市| 百色市| 麻江县| 宁城县| 抚松县| 闻喜县| 迭部县| 色达县| 济宁市| 诸城市| 杭锦后旗| 涞水县| 渝中区| 绥宁县| 孟津县| 伊川县| 靖远县| 沂南县| 临海市| 荥经县| 枣强县| 临颍县| 连南| 汝阳县| 安多县| 静海县| 郎溪县| 青神县| 文化| 诸暨市| 揭阳市| 延安市| 新竹县| 思南县| 宜州市| 蒙山县| 宁都县|